1994
DOI: 10.1016/0167-4048(94)90056-6
|View full text |Cite
|
Sign up to set email alerts
|

Smartcards—A security assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2000
2000
2014
2014

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…password generators for internet dialers) used to enable identity verification. However, presentation of a valid token does not prove ownership because it may have been stolen or duplicated by sophisticated fraudulent means (Svigals, 1994). Tokens also create problems of administration and are inconvenient for users to carry around.…”
Section: Authentication Approachesmentioning
confidence: 99%
“…password generators for internet dialers) used to enable identity verification. However, presentation of a valid token does not prove ownership because it may have been stolen or duplicated by sophisticated fraudulent means (Svigals, 1994). Tokens also create problems of administration and are inconvenient for users to carry around.…”
Section: Authentication Approachesmentioning
confidence: 99%
“…Due to their complexity, smart tokens are more Most problems associated with tokens relate to their cost, administration, loss, and user dissatisfaction due to the inconvenience carrying them. In addition, presentation of a valid token does not prove ownership, as it may have been stolen or duplicated (Svigals, 1994).…”
Section: Possession-based Authenticationmentioning
confidence: 99%